Design and Implementation of a Secure Virtual Private Network Over an Open Network (Internet)
DOI:
https://doi.org/10.58425/ajt.v2i1.134Keywords:
Internet, virtual private network, IPSec Remote Access VPN, site-to-site GRE over IPSec VPN, simulation, packet, tunnel, cryptography, cost effectiveness, reliable transmissionAbstract
Aim: The main objective of this research project is to design and implement a functional secure virtual private network over the internet considering that use of traditional fixed telephones lines is not cost effective and it is unsecured especially in the context of Cameroon.
Methods: In the VPN, internet is used as the data pipelined replacing the traditional data lines. This approach was deployed through simulation with CISCO Packet Tracer.
Results: Simulation results showed that the system can provide a secured, reliable and cost effective transmission system over the Internet for organizations in Cameroon. As such, VPNs form an integral part of remote business communications across the internet due to the inherent risks that exist when sending private information over a public network.
Conclusion: VPNs not only prevent unethical use of private business correspondence by unauthorized parties but they also play an important role in reducing the environmental impact of business travel.
Recommendations: This study recommend an organization which considers security as its top priority to embrace the rather expensive solution of implementing an email/Web/DNS/FTP server at each site rather than using only a single email/web/DNS/FTP server for the entire intranet. This will reduce the amount of information that organization sends across the Internet and increase information access speeds. Home users or small office can equally be installed with an email/web/DNS/FTP server. Also, in the remote access case, a company can outsource the installation and management of their remote access VPN server to the ISP. Moreover, just using IPSec for remote access users is not enough. Remote access IPSec VPN implementation should always be associated with a tunneling protocol such as PPTP.
References
Agency, C. I. (Ed.). (2016). The World Factbook 2016-17 (Annual, Quot; 50th Anniversary ed. edition). Central Intelligence Agency.
Angelescu, S. (2010). CCNA Certification All-in-One For Dummies (1st edition). For Dummies.
Barriers to affordable broadband access in Cameroon. (n.d.). OAfrica. Retrieved January 7, 2023, from https://www.oafrica.com/broadband/barriers-to-affordable-broadband-access-in-cameroon/
Booch, G. (1994). Object-oriented analysis and design with applications Grady Booch (2nd ed, p. ). Menlow Park, Calif. Wokingham Addison-Wesley. http://library.lincoln.ac.uk/items/47635
Bosworth, S., Kabay, M. E., & Whyne, E. (Eds.). (2014). Computer Security Handbook (Volume 2 edition). Wiley.
Chapple, M., Stewart, J. M., & Gibson, D. (2021). (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (9th edition). Sybex.
Cisco ASA 5500-X Series Firewalls—Configuration Guides. (n.d.). Cisco. Retrieved January 4, 2023, from https://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/products-installation-and-configuration-guides-list.html
Cisco Security Appliance Command Line Configuration Guide, Version 7.2—Getting Started [Cisco ASA 5500-X Series Firewalls]. (n.d.). Cisco. Retrieved January 10, 2023, from https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/start.html
Davis, C. (2001). IPSec: Securing VPNs (Illustrated edition). McGraw-Hill/OsborneMedia.
Dunkerley, D., & Samuelle, T. J. (2014). Mike Meyers’ CompTIA Security+ Certification Passport, Fourth Edition (4th edition). McGraw Hill.
Easttom, C. (2012). Computer security fundamentals (2nd ed). Pearson.
II, W. E. (2019). Computer Security Fundamentals (4th edition). Pearson IT Certification. Internet and Broadband in Cameroon: Barriers to Affordable Access. (n.d.-a). World Wide Web Foundation. Retrieved January 8, 2023, from https://webfoundation.org/research/internet-and-broadband-in-cameroon-barriers-to-affordable-access/
Internet and Broadband in Cameroon: Barriers to Affordable Access. (n.d.-b). Alliance for Affordable Internet. Retrieved January 7, 2023, from https://a4ai.org/research/case-study-cameroon/
Jacobson, I. (1992). Object-Oriented Software Engineering: A Use Case Driven Approach (Revised Fourth Printing edition). Addison-Wesley.
Kandé, M. M., Mazaher, S., Prnjat, O., Sacks, L., & Wittig, M. (2001). Applying UML to Design an Inter-domain Service Management Application. 200–214. https://doi.org/10.1007/978-3-540-48480-6_16
Kaufman, C., Perlman, R., Speciner, M., & Perlner, R. (2022). Network Security: Private Communication in a Public World (3rd edition). Addison-Wesley Professional.
Liu, T. (2014). Application and Study of Virtual Private Network Base on L2TP-IPSec. Advanced Materials Research, 1044, 1071–1074.
Madory, D., & Snijders, J. (2022, August 24). How much does RPKI ROV reduce the propagation of invalid routes? Kentik Blog. https://www.kentik.com/blog/how-much-does-rpki-rov-reduce-the-propagation-of-invalid-routes/
Mairs, J. (2001). VPNs: A Beginner’s Guide by John Mairs: New 9780072191813 | eBay. https://www.ebay.com/itm/363386813404
Marshall, L. (1992). Object-oriented software engineering: A use case driven approach: I Jacobson, M Christerson, P Jonsson and G Ōvergaard Addison-Wesley (1992) £29.95 524 pp ISBN 0 201 54435 0. Information and Software Technology, 34(12), 825–826. https://doi.org/10.1016/0950-5849(92)90126-A
Mehdi, K.-P. (2014). Encyclopedia of Information Science and Technology, Third Edition. IGI Global.
Opatrny, J., & Ness, C. (2012). Virtual Private Networks and Secure Remote Access. In Computer Security Handbook (p. 32.1-32.22). John Wiley & Sons, Ltd. https://doi.org/10.1002/9781118851678.ch32
Rumbaugh, J. R., Blaha, M. R., Lorensen, W., Eddy, F., & Premerlani, W. (1991). Object-Oriented Modeling and Design (1st edition). Prentice-Hall.
Snader, J. (2005). VPNs Illustrated: Tunnels, VPNs, and IPsec: Tunnels, VPNs, and IPsec (1st edition). Addison-Wesley Professional.
Stewart, J. M., & Kinsey, D. (2020). Network Security, Firewalls, and VPNs (3rd edition). Jones & Bartlett Learning.
Strahler, O. (2003, May 23). Network Based VPNs | SANS Institute. https://www.sans.org/white-papers/1047/
Sushma, V., & Venkateswarlu, T. (2018). Design and Implementation of Secure Communication Between Two Branches of a Company Using IPSEC Based VPN (Virtual Private Network) Protocol.
Tyson, J. (2008). How a VPN (Virtual Private Network) Works | HowStuffWorks. Retrieved November 16, 2022, from https://computer.howstuffworks.com/vpn3.html
Tyson, J., Pollette, C., & Crawford, S. (2021, April 9). How a VPN (Virtual Private Network) Works | HowStuffWorks. https://computer.howstuffworks.com/vpn.htm
White, C. (2015). Data Communications and Computer Networks: A Business User’s Approach (8th edition). Cengage Learning.
Downloads
Published
How to Cite
Issue
Section
License
The authors retain the copyright and grant this journal right of first publication. This license allows other people to freely share and adapt the work but must give appropriate credit, provide a link to the license, and indicate if changes were made. They may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.